Sciweavers

38 search results - page 1 / 8
» Transforming data to satisfy privacy constraints
Sort
View
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
14 years 4 months ago
Transforming data to satisfy privacy constraints
Data on individuals and entities are being collected widely. These data can contain information that explicitly identifies the individual (e.g., social security number). Data can ...
Vijay S. Iyengar
GECCO
2009
Springer
131views Optimization» more  GECCO 2009»
13 years 2 months ago
A multi-objective approach to data sharing with privacy constraints and preference based objectives
Public data sharing is utilized in a number of businesses to facilitate the exchange of information. Privacy constraints are usually enforced to prevent unwanted inference of info...
Rinku Dewri, Darrell Whitley, Indrajit Ray, Indrak...
DL
1998
Springer
120views Digital Library» more  DL 1998»
13 years 8 months ago
Conjunctive Constraint Mapping for Data Translation
In this paper we present a mechanism for translating information in heterogeneous digital library environments. We model information as a set of conjunctive constraints that are s...
Kevin Chen-Chuan Chang, Hector Garcia-Molina
ISTA
2004
13 years 5 months ago
A Data Transformation Method Based on Schema Mapping
: Schema mapping is an important approach to solve the problem of data integration. This paper introduces a research prototype called SDE, which is a system for managing and facili...
You Li, Dongbo Liu, Weiming Zhang
KDD
2007
ACM
192views Data Mining» more  KDD 2007»
14 years 4 months ago
Allowing Privacy Protection Algorithms to Jump Out of Local Optimums: An Ordered Greed Framework
Abstract. As more and more person-specific data like health information becomes available, increasing attention is paid to confidentiality and privacy protection. One proposed mode...
Rhonda Chaytor